Data Security in Wireless Sensor Networks: Attacks and Countermeasures
暂无分享,去创建一个
Ayodeji Olalekan Salau | Nikhil Marriwala | Muzhgan Athaee | Ayodeji Olalekan Salau | Dr Nikhil Marriwala | Muzhgan Athaee | Dr Nikhil Kumar Marriwala
[1] Prateek Thakral,et al. An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication , 2016 .
[2] Majid Alotaibi. Security to wireless sensor networks against malicious attacks using Hamming residue method , 2019, EURASIP J. Wirel. Commun. Netw..
[3] Javier Sanchez,et al. Encryption techniques: A theoretical overview and future proposals , 2016, 2016 Third International Conference on eDemocracy & eGovernment (ICEDEG).
[4] Sangeeta Solanki,et al. Encryption and Decryption Algorithm using ASCII values with substitution array Approach , 2013 .
[5] Mohey M. Hadhoud,et al. Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..
[6] Alz Danny Wowor,et al. The Existence Of Cryptography: A Study On Instant Messaging , 2017 .
[7] Udepal Singh,et al. An ASCII value based text data encryption System , 2013 .
[8] Mohammed Ali Berawi,et al. Managing Artificial Intelligence Technology for Added Value , 2020, International Journal of Technology.
[9] Nivedita Bisht,et al. Evaluating the Behavior of AluminumCorrosion in Hydrochloric Acid in thePresence Aqueous Extract of Olive Seeds , 2015 .
[10] Prakash Kuppuswamy,et al. IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37 , 2012, BIOINFORMATICS 2012.
[11] R. H. Goudar,et al. An Efficient Cryptographic Scheme for Text Message Protection Against Brute Force and Cryptanalytic Attacks , 2015 .
[12] Asoke Nath,et al. A New Symmetric Key Cryptography Algorithm Using Extended MSA Method: DJSA Symmetric Key Algorithm , 2011, 2011 International Conference on Communication Systems and Network Technologies.
[13] Suparna Biswas,et al. A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network , 2015 .
[14] Akanksha Mathur. A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms , 2012 .
[15] Eddie Shahril Ismail,et al. Secure Hybrid Mode-Based Cryptosystem , 2012 .